Filters
Question type

Study Flashcards

      Sharing or ____ icons, such as those  illustrated in the accompanying figure, enable you to share web content with friends, family, or contacts.   Sharing or ____ icons, such as those  illustrated in the accompanying figure, enable you to share web content with friends, family, or contacts.

Correct Answer

verifed

verified

The number 69.32.133.11 is an example of a(n) domain name . _________________________

A) True
B) False

Correct Answer

verifed

verified

A(n) ____________________, which can be an email client or browser add-on, is software or an app that collects a user's web feed content and provides it in a readable format for the user.

Correct Answer

verifed

verified

Modified Multiple Choice An example of a social media and/or content sharing website is ____.


A) Facebook
B) Pinterest
C) ICANN
D) Twitter

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

____, which is used on both computers and mobile devices, is the second oldest browser.


A) Mozilla Firefox
B) Apple Safari
C) Google Chrome
D) Opera

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

A URL consists of a protocol, domain name, and sometimes a path and file name.

A) True
B) False

Correct Answer

verifed

verified

Modified Multiple Choice Which of the following abbreviations are country-code top-level domains?


A) .cat
B) .uk
C) .ca
D) .int

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Connectivity links or icons enable a user to use social networking websites to share content or access information about the company or organization. _________________________

A) True
B) False

Correct Answer

verifed

verified

____________________ is a general term usually applied to any technology that accesses your computer system to gather information without your knowledge and approval.

Correct Answer

verifed

verified

A logo and/or the business or organization's name generally appears at or near the ____ corner of a webpage to help visitors identify the website.


A) lower-right
B) lower-left
C) upper-right
D) upper-left

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

____________________ extend the capability of your browser by allowing you to access web content or take some action based on selected webpage text.

Correct Answer

verifed

verified

                  Using the text you enter as a basis, ____ suggests websites and search keywords and displays them in a list  as illustrated in the accompanying figure. A)  ICANN B)  AutoComplete C)  PII D)  Atom                 Using the text you enter as a basis, ____ suggests websites and search keywords and displays them in a list  as illustrated in the accompanying figure.


A) ICANN
B) AutoComplete
C) PII
D) Atom

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Modified Multiple Choice Which of the following are technologies that distribute web content to subscribers based on the websites and types of web content the user specifies?


A) RSS
B) Atom
C) TPL
D) SSL

E) C) and D)
F) A) and C)

Correct Answer

verifed

verified

A single web server can store or host many small websites.

A) True
B) False

Correct Answer

verifed

verified

Critical Thinking Questions Case 2-1 You are a parent and your children have begun to use your laptop to browse the web. Because you are concerned about objectionable content, you are trying to learn more about ways to filter web content. What is the default state of the feature described in the previous question?


A) enabled
B) disabled
C) installed
D) empty

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Domains in the DNS are grouped by type of organization or sponsoring group.

A) True
B) False

Correct Answer

verifed

verified

A browser's Stop button might be a(n) ____, included the word, Stop, or resemble a Stop Sign.


A) S
B) X
C) +
D) -

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

A ____ site is a website that is designed to look like a legitimate website, but is actually owned by hackers or online thieves who use its content to capture your sensitive personal information.


A) pop-up
B) malicious
C) privacy
D) shopping

E) A) and D)
F) C) and D)

Correct Answer

verifed

verified

Modified Multiple Choice Which of the following companies offer subscriptions to virus protection software or apps?


A) Norton
B) McAfee
C) Evernote
D) Cengage

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

   Using the accompanying figure, describe the components of a Uniform Resource Locator or URL. Using the accompanying figure, describe the components of a Uniform Resource Locator or URL.

Correct Answer

verifed

verified

a. protocol [http://] - the set of rules...

View Answer

Showing 61 - 80 of 103

Related Exams

Show Answer